Tagged: Attorney

The burdens associated with a massive document review of electronically-stored information (“ESI”) will not, in and of themselves, preclude a court from finding that a party has waived the attorney-client privilege with respect to an inadvertently produced document. In Jacob v. Duane Reade, Inc., Magistrate Judge Katz of the United States District Court for the Southern District of New York held that a privileged, two-page email that was inadvertently produced during the review of over two million documents in less than one month did not have to be returned and that the privilege had been waived because the producing party, Duane Reade, had failed to timely request its return. Duane Reade had used an outside vendor and review team to conduct its review of this large volume of ESI. The document in question concerned a meeting among several individuals, including an in-house attorney at Duane Reade. Duane Reade argued that the email was inadvertently produced because it was neither from nor to an attorney, and only included advice received at a meeting from an in-house attorney, identified in the email only by the first name “Julie.”

The American Bar Association recently published Formal Opinion 11-460 to provide guidance to attorneys regarding their ethical duty upon discovering emails between a third party and the third party’s attorney. The Opinion interprets Model Rule 4.4(b) literally, concluding that neither that rule nor any other requires an attorney to notify opposing counsel of receipt of potentially privileged communications. The Opinion is of particular note because it directly contradicts the New Jersey Supreme Court’s opinion in Stengart v. Loving Care Agency. Inc. 201 N.J. 300 (2010).

When a party voluntarily dumps data on its adversary without first conducting a meaningful privilege review, that party may be deemed to have waived any applicable privileges, particularly where it fails to timely argue that a privilege review would be too costly. That is the lesson of In re Fontainebleau Las Vegas Contract Litig., 2011 U.S. Dist. LEXIS 4105 (S.D. Fla. Jan. 7, 2011), a cautionary tale of the dangers of data dumping. After repeatedly failing to meet court-ordered production deadlines, in response to a subpoena, Fontainebleau Resorts, LLC (“FBR”) essentially dumped on the requesting parties (the “Term Lenders”) three servers containing approximately 800 GB of data–without first conducting any meaningful privilege review. Consequently, in its January 7th decision, the court granted the Term Lenders’ motion seeking a declaration that FBR waived its privilege claims. Had FBR litigated this matter differently, it might have protected its privileged information.

Despite recent decisions from courts of last resort on State and federal levels, some jurisdictions are not extending full protection to otherwise privileged communications made through work-issued computers and PDAs. We last wrote on this issue after the New Jersey Supreme Court held that an employee did not waive the attorney-client privilege when using a company computer to communicate with her attorney via a personal password-protected e-mail account. Stengart v. Loving Care Agency. A short time later, in Quon v. Arch Wireless, the United States Supreme Court determined that the search of an employee’s text messages on a work-issued pager was reasonable and did not violate the employee’s Fourth Amendment rights. In the wake of these holdings, courts in other jurisdictions continue to make their own path through this new area of law. In Holmes v. Petrovich Development Company, LLC, the latest in the line of cases, the California Court of Appeals held that an employee’s e-mail communications with her attorney from her work computer did not constitute “‘a confidential communication between client and lawyer'” under Section 954 of the California Evidence Code.

Some traditional practices from the paper era don’t translate well to the world of e-communication. And some are downright dangerous. Back in the day, attorneys would often “bcc” their clients on correspondence to adversaries, an efficient and relatively safe means of keeping the client apprised. No longer in the age of email, where the ability to instantly respond invites quick, at times reactionary, replies that can easily fall into the wrong hands, with potentially devastating consequences.

That was the lesson of a recent case out of the New York State Supreme Court, Nassau County, where the court refused to order a forensic examination of a plaintiff’s personal computer hard drive. DeRiggi v. Krischen arose out of the death of a woman during a routine surgical procedure to treat lower back pain. Plaintiffs alleged that her death was the result of perforation of the left common iliac vein by a “Spine Jet HydroDisectomy” system utilized during the procedure. Plaintiffs further alleged, among other things, that the manufacturer of the system misrepresented the risks affiliated with its use, and one of the plaintiffs, the decedent’s husband, testified at deposition that he and his wife visited the manufacturer’s website prior to the surgery and read that the procedure “felt like a bee sting and nothing more.”

Facebook, Twitter, LinkedIn and MySpace are among the top social media websites that have culturally transformed electronic communications and social interactions. Inevitably, these platforms have also affected litigation practice and present myriad ethical dilemmas. One such dilemma is whether an attorney can access an adverse party’s social networking website to obtain information about the party, including impeachment material.

Connect:

About Gibbons

With more than 200 attorneys, Gibbons is a leading law firm in New Jersey, New York, Pennsylvania, and Delaware, ranked among the nation’s top 200 by The American Lawyer. More...

We use cookies to enhance your experience on our website and to enable you to register when necessary. If you press "ACCEPT," you agree to receive all cookies on the website. If you prefer to refuse our use of cookies, or would like more information, please see our Cookie Policy and Privacy Policy.ACCEPT